General

  • Target

    4ed9306b5dd32049c06821b66b76a6f3.bin

  • Size

    19.9MB

  • Sample

    241122-blzjzsxlhn

  • MD5

    df95e2a07c341cc2fb9643c12010f285

  • SHA1

    8af6ea0bb2d9d4fd121be941b2e7e976024f9731

  • SHA256

    37457f71c7889c825663bf71002438f9cffb88464c3575fde2dc29bc79a2538b

  • SHA512

    c622695de4d71a4bc25ded90cd63d29d83c3c85506282883e41d7fd580685e68c397bd6cefc13e2830c73482ffd5c79dc88bb8d03c80b72f4f02ed81ae641df6

  • SSDEEP

    393216:seDOX1bwmFTH1EyHJ07A52oAGlkABJHAeQTPIGawOS8Ii/CC7Vqpeh:s2aHz1VpN4HigT9aX/CC7Vqpeh

Score
10/10

Malware Config

Targets

    • Target

      cho_mea64.exe

    • Size

      20.4MB

    • MD5

      044f51347e293ac77de4cd47bdccbacf

    • SHA1

      4c67777228575ac317c62855e6d9dd0a6da48c2d

    • SHA256

      4ca9da66d04a5f68deb0bab55aca5d64b8d8307c58f2943d6a67a3b584855ee2

    • SHA512

      f3976170a7f965f9674712904a0effc8383ea1a7ac5961a746b319d4659f52f82578b5adf4a0ca52f0434a896d310268ac7e40391fb0ea929a2482bb78aa0775

    • SSDEEP

      393216:SiX7fx65E78eL1uwtkbZtqtQEt8+OIbyMl1PiT+KiSn7h6LPr8Y:bTxOEJuw+bP5krOIO3aKiSn7aPIY

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks